How to pass proxy server using thirty party proxy?

Posted on 2006-03-31
Last Modified: 2012-05-05

I am having a problem with my program. it can not pass through my proxy to download anything.

I use a torrent downloader but my internet connection is using proxy. I think  may be the administrator is blocking the port. I tried to use HTTP Tunnelling to go through the proxy but it still not work. Do you have any idea with this or do you have any program to solve this?

Please help  Because I really want to download the program very much.

Very Thank you,
Question by:veayou
    LVL 4

    Expert Comment

    Hi veayou,

    Sometimes in such networks there's a "back door" to bypass proxy... You have 2 ways to find if there's one for you:
    1. Ask any person next to you who knows it... or
    2. Ask the network administrator...

    If your network is secure enough (I mean, IF) I suppose you can't do what you want. If you can do,... ok,... the network is not enough secure!


    Author Comment

    Hi diasf,

    Yes, that's right. My network is securing connection. They don't allow people to use any download program. But with I knowledge, I think there may be a program that can convert every request to HTTP request and vice versa. That's why I ask if there is someone know that program.

    If there is no way so i have no way too.

    Thank you,
    LVL 4

    Accepted Solution

    The bad news: You can't do it, unless you use any really-wrong program to bypass the security in your network. As you know, it is possible. As I use to say, if someone can break into NASA network, for sure you can have a way to bypass your security. But, as you also know, that's totally out of the rules, and if you for any instance can break it, you're breaking the rules, and you can for sure expect some bad results...

    Excuse me for this moral speech... Just trying to show you the danger of what you intend to do...

    So, the first answer is: No, there's no legal way. The second answer: try to talk to the network administrator. If there's a legal way, I'm sure he will tell you of it.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now